Heartbleed: Eight Tips and Strategies for Keeping Safe

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10
Previous Next

Click through for eight important tips and strategies for keeping data safe, as identified by LogRhythm Labs.

One of the most dangerous IT security threats of all time emerged recently – a bug called Heartbleed, which quickly sent shockwaves throughout the entire industry.

As a result, Fortune 500 organizations have been racing to patch their networks before hackers exploit the vulnerability and steal important, private data. Consumers are also encouraged to change their passwords after the systems have been patched.

The vulnerability emerged from the open source software universe. It was exposed to the Internet before a patch was made available, technically making it a zero-day vulnerability, and forcing IT administrators and security analysts to respond as quickly as possible to a previously unknown threat.

OpenSSL provides encryption to services such as SSL and TLS, which are primarily used for securing Web application traffic and reducing the risk of someone stealing credentials or other sensitive data while in transit. The vulnerability arose from a simple programming error in certain releases of the OpenSSL library (1.0.1-1.0.1f). It's technically referred to as a Buffer Over Read in that once the exploit is successful, 64k of the server's memory 'leaks' and can then be viewed by an unauthorized party.

This is significant in that very sensitive data can be contained within the server's memory, which could include anything from usernames, passwords, account numbers, private keys, session tokens and much more. Successful exploitation of this vulnerability is also trivially easy to pull off, opening the door for many unskilled 'hackers' to gain access to sensitive, private information.

What's more, if secret keys are stolen, this can allow the attacker to man-in-the-middle any traffic destined for the application, allowing them to snoop on private and sensitive application interactions such as financial transactions.

Here are eight important tips and strategies to keep data safe, as identified by LogRhythm Labs.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AVTEST2014Awards0x AV-TEST Identifies the 10 Best Security Products of 2014

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented in five categories, including protection, performance, usability, Android security and best repair. ...  More >>

Security58-190x128 Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. ...  More >>

MenloSecurityMalware0x Five Cyber Attacks that Made CISOs Rethink Security

Security today is based on the premise that one can detect whether something is good or bad. This premise is fundamentally flawed as malware continues to evade even the latest security technologies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date